The Best 2735 Security Alternatives

  • SHADE Sandbox icon

    SHADE Sandbox

    Sandbox application, works for all versions of windows (XP - Win 10), both 32 & 64 bit.

  • P2PVPN icon

    P2PVPN

    P2PVPN creates a virtual private network for you which behaves like a physical network (e.g. your network at home). But instead of using an Ethernet cable to connect computers P2PVPN uses secure Internet connections.

  • PirateBrowser icon

    PirateBrowser

    PirateBrowser is an Internet browser by The Pirate Bay used to circumvent Internet censorship.

  • Img.bi icon

    Img.bi

    Open source secure image hosting with client-side AES-256 encryption.

  • Jetico BestCrypt icon

    Jetico BestCrypt

    If your computer were ever to be stolen, are you certain that your personal information cannot be discovered? Jetico’s BestCrypt software automatically encrypts your files so that nobody can read the data unless they have the right...

  • RogueKiller icon

    RogueKiller

    RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, …

  • Gargoyle icon

    Gargoyle

    Gargoyle is a free firmware upgrade for your wireless router, based on OpenWRT but with an enhanced interface (not LUCI) focused on ease of use.

  • TorGuard icon

    TorGuard

    With all the security issues created by hackers, net censorship, identity theft, and ISPs’ monitoring activities, your online privacy has never been more threatened or important.

  • Agora icon

    Agora

    Agora simplifies how you manage all your files online. We've made Dropbox, Google Drive, and Box universal so you can manage all your files from a single spot.

  • ZenVPN icon

    ZenVPN

    Uncensored And Secure Internet Access. Bypass website blocks and protect your connection from wiretapping using ZenVPN fast and affordable VPN service.

  • IVRE icon

    IVRE

    Network recon framework, including a web interface to browse Nmap scan results.

  • Cisco AnyConnect icon

    Cisco AnyConnect

    Make the VPN experience simpler and more secure with the enhanced remote access technology of Cisco AnyConnect Secure Mobility Client.

  • Hands Off! icon

    Hands Off!

    Hands Off! is an application to monitor and control the access of applications to your network and disks.

  • HTTP Ripper icon

    HTTP Ripper

    HTTP Ripper is a tool to rip content out of the web.

  • Glype icon

    Glype

    Glype proxy script is a free-to-use, web-based proxy script written in PHP. Similar to a typical proxy server, a web-proxy script downloads requested web pages and files and forwards them back to the user.

  • Stackfield icon

    Stackfield

    Stackfield is a Slack-alternative for chat, collaboration, calendaring and file-sharing. It enables encrypted chatting (end-to-end encryption) and is hosted in Germany.

  • UFS Explorer Professional Recovery icon

    UFS Explorer Professional Recovery

    UFS Explorer Professional Recovery provides a professional approach to data recovery. Advanced multi-tool interface makes the software suit even complicated data recovery tasks, being perfect for data recovery specialists.

  • Universal Password Manager icon

    Universal Password Manager

    Universal Password Manager allows you to store all your usernames and passwords in one highly secure encrypted database. Its strengths are its simplicity, portability and security (uses 128bit AES encryption).

  • Kon-Boot icon

    Kon-Boot

    Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! In other words you can login to your Windows profile without knowing your password.